Understanding Phishing Campaigns: how they are performed, and which data is useful for attackers
Common Information
Type Value
UUID cd509524-86e2-4285-9a31-0caa1f6d4474
Fingerprint a8c40d9b17755bd8
Analysis status DONE
Considered CTI value 0
Text language
Published Jan. 20, 2023, 3:49 p.m.
Added to db Jan. 20, 2023, 5:27 p.m.
Last updated Oct. 11, 2024, 11:06 p.m.
Headline Understanding Phishing Campaigns: how they are performed, and which data is useful for attackers
Title Understanding Phishing Campaigns: how they are performed, and which data is useful for attackers
Detected Hints/Tags/Attributes 30/2/2
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 167 Cybersecurity on Medium https://medium.com/feed/tag/cybersecurity 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 8
companyname.com
Details Email 1
name.surname@companyname.com